Information Security Quiz

11 Questions
Information Security Quiz

A quiz to determine how much you really know about information security and the threats facing us today. Take the quiz and win a prize!

Sample Question

Which of the following is the definition of a computer worm?

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It does not need to attach itself to an existing program.

A program designed to breach the security of a computer system while ostensibly performing some innocuous function.

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

Number of Questions:

More Options
Please wait...
Questions and Answers
  • 1. 
    • A. 

      A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

    • B. 

      A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It does not need to attach itself to an existing program.

    • C. 

      A program designed to breach the security of a computer system while ostensibly performing some innocuous function.

    • D. 

      A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

  • 2. 
    What is the name of the software developed jointly by the US and Israel that damaged almost one-fifth of Iran's nuclear centrifuges in 2010. 
    • A. 

      Duqu

    • B. 

      Flame

    • C. 

      Conficker

    • D. 

      Stuxnet

  • 3. 
    According to the 2014 Ponemon report on data breaches in the United States, the average cost per record lost during a data breach to an organization:
    • A. 

      $50

    • B. 

      $100

    • C. 

      $200

    • D. 

      $300

  • 4. 
    True or false?  According to the Freedom and Information and Privacy (FOIP) legislation in Alberta, the University is authorized to collect personal information about you from outside sources such as tax and health records without your consent?
    • A. 

      True

    • B. 

      False

  • 5. 
    Which of the following fields are mandatory in the University of Lethbridge password change form (select multiple answers)
    • A. 

      One or more Lower Case Letters

    • B. 

      One or more Upper Case Letters

    • C. 

      One or more Numeric Digit

    • D. 

      One or more Punctuation / Symbol chars

    • E. 

      Eight or more Characters long

    • F. 

      No 3 character Repeats or Sequences

    • G. 

      No 4 character Keyboard Sequences

    • H. 

      No 4 character Personal Data Sequences

  • 6. 
    What does the University of Lethbridge Password standard state is the acceptable timeframe for the life of your password?
    • A. 

      90 days

    • B. 

      6 months

    • C. 

      1 year

    • D. 

      No expiration date on passwords

  • 7. 
    It is recommended to reuse your password on multiple sites to make it easier to remember.
    • A. 

      True

    • B. 

      False

  • 8. 
    It is ok to share my password with
    • A. 

      Spouse/Partner

    • B. 

      Children

    • C. 

      Help Desk Staff

    • D. 

      Co-workers or administrative assistants

    • E. 

      Friends

    • F. 

      Nobody

  • 9. 
    A phishing attack, or a communication asking a user to reveal their username and password to an attacker can direct a user to (select multiple answers)
    • A. 

      Reply via email

    • B. 

      Open a webpage to enter information

    • C. 

      Open a file and send to a different location

    • D. 

      Provide sensitive information over the phone

  • 10. 
    In the address portion of a website, what prefix indicates your communications are being encrypted during transit
    • A. 

      Http://

    • B. 

      Https://

    • C. 

      Ftp://

    • D. 

      Tcp://

  • 11. 
    BONUS QUESTION: (If correct you get two items)The recent Sandworm malware, distributed by Russian hackers, takes advantage of a zero day vulnerabilty (an unpatched flaw in software), in which Microsoft Office Product
    • A. 

      Microsoft Word

    • B. 

      Microsoft Excel

    • C. 

      Microsoft Powerpoint

    • D. 

      Microsoft Outlook